Enterprise & Security

Success at every size and stage.

Maybe you’re a fintech with high security requirements. A public enterprise with complex internal processes. Or you’re getting ready to IPO and need to ensure your headcount and spend management processes are bulletproof.
In all cases, Trace goes deep on services, compliance, and security to make sure your unique needs are met. 

Services

Get white-glove treatment.

Premium Onboarding
Complex integrations or workflows? Our implementation specialists go deep to make sure your project is successful.
Change Management Services
Leverage our expert team to learn how to set up world class operations and get your teams trained and onboarded.

Compliance

Trust in the security of your data.

SOC 2 Type 2 Certified
Trace’s service commitments and system requirements were achieved based on the trust services criteria relevant to security and confidentiality set forth in TSP 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy.
GDPR Compliant
Our software is fully compliant with the General Data Protection Regulation (GDPR), a regulation that protects the privacy and security of personal data. 

Security

Protect sensitive information.

We understand the sensitivity and risk of the financial information we strive to keep secure. We just don’t help our customers with vendor assessments and risk management—we practice what we preach.
Single Sign-on
Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials. Authenticate through Okta, Google, Microsoft, and more.
Data Permissions & Access
We enable granular permission levels within the app to be set for your teammates. Permissions can be set to include app settings, integrations, user data, and financial data.
Vulnerability Scanning
Trace utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.
Incident Response
Trace has policies and procedures for handling security events which includes escalation paths, rapid resolution, and post-mortems.
Training
All employees complete a security training program to understand risks, procedures, and employ best practices when handling customer data.
Policies
Our team is responsible for reviewing, updating, testing, and maintaining our security, privacy, and data protection policies. All employees are informed of our policies.
View our Privacy Policy

Security questions?

Our team is here to address any questions or issues you might have.